BeyondTrust Endpoint Privilege Management and ESET PROTECT Enterprise compete in the cybersecurity industry with a focus on endpoint and privilege management. BeyondTrust appears to have the upper hand with its advanced PAM-specific features, integration with multiple security vendors, and comprehensive session management.
Features: BeyondTrust specializes in Privileged Access Management (PAM) and Vulnerability Management (VM), providing powerful session management, detailed analytics, and a robust password vaulting system. Its extensive integration capabilities and strong reporting functions make it a top choice for organizations. ESET PROTECT Enterprise focuses on security management and automation for endpoints, featuring strong Zero-Day Protection, Endpoint Detection and Response (EDR) capabilities, and user-friendly endpoint management.
Room for Improvement: BeyondTrust needs to enhance support for non-Windows systems, improve its user interface, and expand integrations with various ticket management systems. ESET PROTECT can benefit from increased customization options, better cloud integration for dynamic rule management, and refined management features for wider endpoints. Both products could further improve their reporting features to present security insights more effectively.
Ease of Deployment and Customer Service: Both BeyondTrust and ESET PROTECT are predominantly deployed on-premises with some usage in public cloud environments. BeyondTrust customers report excellent technical support, recognizing staff expertise despite occasional delays. ESET users praise their support experience, noting prompt responses even when email engagement is necessary due to geographical limitations in support availability.
Pricing and ROI: BeyondTrust is often considered costly compared to competitors, owing to its premium features and leading position in PAM, with mixed feedback about its asset-based licensing model. However, many find the software delivers good value for money. ESET PROTECT is seen as more cost-effective, offering strong value for money with its feature set despite varying opinions on cost in comparison to other solutions. Both products are viewed as providing solid ROI by ensuring compliance and boosting security measures.
The return on investment is excellent due to its functionality and ease of installation.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
The tech support from ESET is amazing, and I would rate it as ten out of ten.
They are very responsive and help in solving issues quickly.
They were helpful with billing inquiries and offered promotions and discounts.
The initial understanding of the environment is crucial, followed by a simple deployment process.
It can efficiently scale up to thousands of devices in an organization without issues.
It is better suited for workstations rather than server environments.
The appliances are stable, and there are no significant issues with backups or recovery.
The solution is stable, and I have not encountered any glitches.
The solution is very, very stable.
I experience some problems occasionally but have fast support to troubleshoot.
There is a need for better MQ integration with DevOps and improvements in architecture.
The ability to view recorded live sessions of specific users is a crucial benefit.
Sometimes, agents lose connection with the management console, and the administration team needs to reinstall the agents on the computers.
It takes a lot of processing power when the machine is initially booted.
They need to reduce the number of notifications on the endpoints.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
I pay 40 dollars per agent annually, which is cheaper than 60 dollars per agent for Check Point.
We recently paid fourteen dollars and thirty-six cents per unit for 20 users, which is reasonable.
The pricing is reasonable, and I would rate it five on a scale of ten where five is moderate.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
Its web component prevents infections from malicious websites, which enhances its anti-malware capabilities.
It allows simple whitelisting and has a learning mode for new installations, which reduces false positives by adapting to typical user habits.
One of the strong features of ESET PROTECT Enterprise is its ability to work well on old computers.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
ESET PROTECT Enterprise ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.